Many things have been unveiled by the documents leaked by NSA whistleblower Edward Snowden, but the question of how he managed to extract them from the agency's internal network without triggering any alarms is still unanswered.

NBC News' Richard Esposito and Matthew Cole have a plausible explanation following consultations with a number of unnamed intelligence community sources.

One: when it comes to technology, the NSA is still stuck in 2003. Two: Snowden had both a top secret security clearance and, as a system administrator, elevated privileges that allowed him to access any file he wanted without leaving a trace, or to delete these traces himself by modifying log files so that they don't show up in audits.

According to an agency official that has been briefed about the conclusions of the internal investigation in the matter, Snowden was a ghost user in the agency's internal network, even though he was able to pass himself off as any other authorized user.

Third: his position as a sysadmin allowed him to use external storage drives and to copy documents onto them. So, even if someone at his workplace would notice him doing such a thing, it wouldn't be at all suspicious. And fourth: working at some 5,000 miles and six time zones from NSA headquarters at Fort Meade, Maryland, his workday overlapped very little with that of employees stationed there, and the possibility of someone noticing his use of thumb drives was minimal.

One of the fallouts of the Snowden incident is NSA's announced move to drastically scale down the number of its systems administrators. It currently employs around 1,000 - and a lot of them are contractors - and aims to reduce that number by 90 percent.

A two-person system that will require two employees to sign off on copying any classified data from a secure network onto a portable storage device has also been made public.

AP reporters also talked to agency officials that said that the government's forensic investigation is still trying to determine how Snowden managed to defeat safeguards put in place to monitor and deter people like him.

"The disclosure undermines the Obama administration's assurances to Congress and the public that the NSA surveillance programs can't be abused because its spying systems are so aggressively monitored and audited for oversight purposes: If Snowden could defeat the NSA's own tripwires and internal burglar alarms, how many other employees or contractors could do the same?" they wonder.

Also, if Snowden managed to execute this feat without anyone noticing, and the NSA surely employs a number of people that have the knowledge and the privileges to do the same, there's always the possibility that it has happened before, but that the person in question decided to sell the information to the highest bidder instead of going to the press.

All in all, it also seems that the investigators still haven't discovered what documents Snowden managed to download and take with him, which would explain, in part, why the the British police recently detained the partner of Guardian reporter Glenn Greenwald and why it seized the laptop and portable storage drives he was carrying back to Brazil.

Spotlight

Microsoft Edge, the new browser in Windows 10, represents a significant increase in the security over Internet Explorer. However, there are also new potential threat vectors that arenít present in older versions.

35 percent of employees would sell information on company patents, financial records and customer credit card details if the price was right. This illustrates the growing importance for organizations to deploy data loss prevention strategies.

Sun Tzu's writings have been studied throughout the ages by professional militaries and can used to not only answer the question of whether or not we are in a cyberwar, but how one can fight a cyber-battle.

Infosec consultant Paul Moore came up with a working solution to thwart a type of behavioral profiling. The result is a Chrome extension called Keyboard Privacy, which prevents profiling of users by the way they type by randomizing the rate at which characters reach the DOM.